<?xml version="1.0" encoding="UTF-8"?><rss xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">  <channel>    <title>Computerworld: Jaikumar Vijayan</title>    <link>http://www.computerworld.com/</link>    <description />    <language>en_US</language>    <copyright>(c) Copyright 2014 Computerworld, Inc. All Rights Reserved.</copyright>    <pubDate>Tue, 26 Aug 2014 07:12:34 GMT</pubDate>    <dc:date>2014-08-26T07:12:34Z</dc:date>    <dc:language>en_US</dc:language>    <dc:rights>(c) Copyright 2014 Computerworld, Inc. All Rights Reserved.</dc:rights>    <item>      <title>Shadow cloud services pose a growing risk to enterprises</title>      <link>http://www.computerworld.com/s/article/9250606/Shadow_cloud_services_pose_a_growing_risk_to_enterprises?source=rss_cwstaff_jaikumar_vijayan</link>      <description>A growing tendency by business units and workgroups to sign up for cloud services without asking their IT organization creates serious risks for enterprises.</description>      <pubDate>Mon, 25 Aug 2014 10:27:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9250606/Shadow_cloud_services_pose_a_growing_risk_to_enterprises?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-08-25T10:27:00Z</dc:date>    </item>    <item>      <title>UPS now the third company in a week to disclose data breach</title>      <link>http://www.computerworld.com/s/article/9250545/UPS_now_the_third_company_in_a_week_to_disclose_data_breach?source=rss_cwstaff_jaikumar_vijayan</link>      <description>Credit and debit card information belonging to customers who did business at 51 UPS Store Inc. locations in 24 U.S. states this year may have been compromised.</description>      <pubDate>Thu, 21 Aug 2014 00:52:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9250545/UPS_now_the_third_company_in_a_week_to_disclose_data_breach?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-08-21T00:52:00Z</dc:date>    </item>    <item>      <title>Healthcare organizations still too lax on security</title>      <link>http://www.computerworld.com/s/article/9250492/Healthcare_organizations_still_too_lax_on_security?source=rss_cwstaff_jaikumar_vijayan</link>      <description>The data breach at Community Health Systems  that exposed the personal information  on more than 4.5 million people is a symptom of the chronic lack of attention to patient data security and privacy within the healthcare industry.</description>      <pubDate>Tue, 19 Aug 2014 20:13:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9250492/Healthcare_organizations_still_too_lax_on_security?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-08-19T20:13:00Z</dc:date>    </item>    <item>      <title>About 4.5M face risk of ID theft after hospital network hacked</title>      <link>http://www.computerworld.com/s/article/9250464/About_4.5M_face_risk_of_ID_theft_after_hospital_network_hacked?source=rss_cwstaff_jaikumar_vijayan</link>      <description>About 4.5 million people in 28 states face the risk of identity theft due to a massive data breach at Community Health Systems (CHS) a Franklin, Tenn., based health network.</description>      <pubDate>Mon, 18 Aug 2014 19:07:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9250464/About_4.5M_face_risk_of_ID_theft_after_hospital_network_hacked?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-08-18T19:07:00Z</dc:date>    </item>    <item>      <title>Supervalu breach shows why move to smartcards is long overdue</title>      <link>http://www.computerworld.com/s/article/9250413/Supervalu_breach_shows_why_move_to_smartcards_is_long_overdue?source=rss_cwstaff_jaikumar_vijayan</link>      <description>The data breach disclosed by Supervalu is another reminder about why the ongoing migration of the U.S. payment system to smartcard technology can't happen fast enough.</description>      <pubDate>Sat, 16 Aug 2014 10:44:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9250413/Supervalu_breach_shows_why_move_to_smartcards_is_long_overdue?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-08-16T10:44:00Z</dc:date>    </item>    <item>      <title>Grocery stores in multiple states hit by data breach</title>      <link>http://www.computerworld.com/s/article/9250402/Grocery_stores_in_multiple_states_hit_by_data_breach?source=rss_cwstaff_jaikumar_vijayan</link>      <description>A data breach at Supervalu Inc., one of the largest grocery wholesalers and retailers in the U.S., could affect thousands of people who shopped at the company's stores in June and July.</description>      <pubDate>Fri, 15 Aug 2014 16:29:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9250402/Grocery_stores_in_multiple_states_hit_by_data_breach?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-08-15T16:29:00Z</dc:date>    </item>    <item>      <title>Tennessee firm blames bank for $193K cybertheft</title>      <link>http://www.computerworld.com/s/article/9250360/Tennessee_firm_blames_bank_for_193K_cybertheft?source=rss_cwstaff_jaikumar_vijayan</link>      <description>A lawsuit filed in Tennessee earlier this month has resurfaced questions about a bank's responsibility in protecting customers against cyberheists.</description>      <pubDate>Wed, 13 Aug 2014 19:16:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9250360/Tennessee_firm_blames_bank_for_193K_cybertheft?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-08-13T19:16:00Z</dc:date>    </item>    <item>      <title>Senator wants curbs placed on fitness data use</title>      <link>http://www.computerworld.com/s/article/9250301/Senator_wants_curbs_placed_on_fitness_data_use?source=rss_cwstaff_jaikumar_vijayan</link>      <description>Sen. Charles Schumer (D-N.Y.) wants the U.S. Federal Trade Commission to investigate the data gathering and sharing practices of makers of personal fitness devices and applications.</description>      <pubDate>Mon, 11 Aug 2014 20:17:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9250301/Senator_wants_curbs_placed_on_fitness_data_use?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-08-11T20:17:00Z</dc:date>    </item>    <item>      <title>PCI Security Council moves to boost service providers' credit card security</title>      <link>http://www.computerworld.com/s/article/9250261/PCI_Security_Council_moves_to_boost_service_providers_credit_card_security?source=rss_cwstaff_jaikumar_vijayan</link>      <description>The PCI Security Standards Council has updated its guidance to help merchants better determine whether third party service providers have implemented security measures to protect credit and debit cardholder data.</description>      <pubDate>Fri, 08 Aug 2014 18:06:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9250261/PCI_Security_Council_moves_to_boost_service_providers_credit_card_security?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-08-08T18:06:00Z</dc:date>    </item>    <item>      <title>Russian credential theft shows why the password is dead</title>      <link>http://www.computerworld.com/s/article/9250242/Russian_credential_theft_shows_why_the_password_is_dead?source=rss_cwstaff_jaikumar_vijayan</link>      <description>News that Russian hackers amassed log-in credentials belonging to more than 1.2 billion Internet users hammers home why companies that have not implemented strong authentication measures really need to get moving on it.</description>      <pubDate>Thu, 07 Aug 2014 20:15:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9250242/Russian_credential_theft_shows_why_the_password_is_dead?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-08-07T20:15:00Z</dc:date>    </item>    <item>      <title>Cybersecurity should be professionalized</title>      <link>http://www.computerworld.com/s/article/9250174/Cybersecurity_should_be_professionalized?source=rss_cwstaff_jaikumar_vijayan</link>      <description>The time is ripe for professionalizing cybersecurity, according to Salve Regina University's Pell Center for International Relations and Public Policy.</description>      <pubDate>Tue, 05 Aug 2014 20:15:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9250174/Cybersecurity_should_be_professionalized?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-08-05T20:15:00Z</dc:date>    </item>    <item>      <title>Retail industry rallies behind open standard for tokenization</title>      <link>http://www.computerworld.com/s/article/9250115/Retail_industry_rallies_behind_open_standard_for_tokenization?source=rss_cwstaff_jaikumar_vijayan</link>      <description>A coalition of retail industry trade groups this week called for the creation of an open tokenization standard for protecting credit and debit card data from theft and misuse.</description>      <pubDate>Fri, 01 Aug 2014 20:09:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9250115/Retail_industry_rallies_behind_open_standard_for_tokenization?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-08-01T20:09:00Z</dc:date>    </item>    <item>      <title>Microsoft ordered to turn over customer data stored in the cloud</title>      <link>http://www.computerworld.com/s/article/9250102/Microsoft_ordered_to_turn_over_customer_data_stored_in_the_cloud?source=rss_cwstaff_jaikumar_vijayan</link>      <description>Microsoft has been ordered to comply with a U.S. government demand for a customer's emails stored on a company server in Dublin, Ireland.</description>      <pubDate>Fri, 01 Aug 2014 09:57:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9250102/Microsoft_ordered_to_turn_over_customer_data_stored_in_the_cloud?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-08-01T09:57:00Z</dc:date>    </item>    <item>      <title>Attackers exploit remote access tools to compromise retail systems</title>      <link>http://www.computerworld.com/s/article/9250092/Attackers_exploit_remote_access_tools_to_compromise_retail_systems?source=rss_cwstaff_jaikumar_vijayan</link>      <description>Malicious hackers are using remote access tools to break into retail point-of-sale systems and plant malware on them, the Department of Homeland Security warned.</description>      <pubDate>Thu, 31 Jul 2014 19:57:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9250092/Attackers_exploit_remote_access_tools_to_compromise_retail_systems?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-07-31T19:57:00Z</dc:date>    </item>    <item>      <title>CISOs still struggle for respect from peers</title>      <link>http://www.computerworld.com/s/article/9250086/CISOs_still_struggle_for_respect_from_peers?source=rss_cwstaff_jaikumar_vijayan</link>      <description>Chief information security officers (CISOs) continue to have a hard time gaining the respect of other C-suite executives despite the heightened focus overall on information security.</description>      <pubDate>Thu, 31 Jul 2014 16:47:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9250086/CISOs_still_struggle_for_respect_from_peers?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-07-31T16:47:00Z</dc:date>    </item>    <item>      <title>There's still a security disconnect on BYOD</title>      <link>http://www.computerworld.com/s/article/9249680/There_s_still_a_security_disconnect_on_BYOD?source=rss_cwstaff_jaikumar_vijayan</link>      <description>Corporate employees are taking a surprisingly lax approach towards security issues raised by the business use of personally owned mobile devices.</description>      <pubDate>Fri, 11 Jul 2014 16:55:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9249680/There_s_still_a_security_disconnect_on_BYOD?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-07-11T16:55:00Z</dc:date>    </item>    <item>      <title>New docs show DHS was more worried about critical infrastructure flaw in '07 than it let on</title>      <link>http://www.computerworld.com/s/article/9249642/New_docs_show_DHS_was_more_worried_about_critical_infrastructure_flaw_in_07_than_it_let_on?source=rss_cwstaff_jaikumar_vijayan</link>      <description>The Department of Homeland Security mistakenly released details on an experiment in which a 27-ton generator was destroyed via a cyberattack.</description>      <pubDate>Wed, 09 Jul 2014 21:39:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9249642/New_docs_show_DHS_was_more_worried_about_critical_infrastructure_flaw_in_07_than_it_let_on?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-07-09T21:39:00Z</dc:date>    </item>    <item>      <title>NSA defends collecting data from U.S. residents not suspected of terrorist activities</title>      <link>http://www.computerworld.com/s/article/9249586/NSA_defends_collecting_data_from_U.S._residents_not_suspected_of_terrorist_activities?source=rss_cwstaff_jaikumar_vijayan</link>      <description>The National Security Agency Monday defended its data collection practices amid revelations that almost 90% of the data it sweeps up involves ordinary Internet users not suspected of crimes.</description>      <pubDate>Mon, 07 Jul 2014 20:22:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9249586/NSA_defends_collecting_data_from_U.S._residents_not_suspected_of_terrorist_activities?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-07-07T20:22:00Z</dc:date>    </item>    <item>      <title>Hackers hit more businesses through remote access accounts</title>      <link>http://www.computerworld.com/s/article/9249516/Hackers_hit_more_businesses_through_remote_access_accounts?source=rss_cwstaff_jaikumar_vijayan</link>      <description>Hackers recently broke into payment systems at several northwestern U.S. restaurants and food service companies via a remote access account belonging to one of their vendors, another example of the need for companies to monitor third-party access to their networks.</description>      <pubDate>Wed, 02 Jul 2014 11:48:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9249516/Hackers_hit_more_businesses_through_remote_access_accounts?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-07-02T11:48:00Z</dc:date>    </item>    <item>      <title>Critics blast Microsoft's takedown of No-IP domains</title>      <link>http://www.computerworld.com/s/article/9249515/Critics_blast_Microsoft_s_takedown_of_No_IP_domains?source=rss_cwstaff_jaikumar_vijayan</link>      <description>Microsoft's tactics in using a court order to seize nearly two-dozen No-IP.com domains it said were used to distribute Windows malware tools were called ham-handed by several critics.</description>      <pubDate>Wed, 02 Jul 2014 11:11:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9249515/Critics_blast_Microsoft_s_takedown_of_No_IP_domains?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-07-02T11:11:00Z</dc:date>    </item>    <item>      <title>Groups fear bill would allow free flow of data between private sector and NSA</title>      <link>http://www.computerworld.com/s/article/9249444/Groups_fear_bill_would_allow_free_flow_of_data_between_private_sector_and_NSA?source=rss_cwstaff_jaikumar_vijayan</link>      <description>A draft U.S. Senate bill aimed at making it easier for organizations to share cyberthreat information poses serious threats to personal privacy, several rights groups said in a letter to Congress on Thursday.</description>      <pubDate>Fri, 27 Jun 2014 20:11:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9249444/Groups_fear_bill_would_allow_free_flow_of_data_between_private_sector_and_NSA?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-06-27T20:11:00Z</dc:date>    </item>    <item>      <title>Google's move into home automation means even less privacy</title>      <link>http://www.computerworld.com/s/article/9249400/Google_s_move_into_home_automation_means_even_less_privacy?source=rss_cwstaff_jaikumar_vijayan</link>      <description>Smart thermostat maker Nest Labs plans to soon start sharing some customer data with Google, its corporate parent, and that means the search engine giant will have to address users' privacy concerns as it expands into home automation.</description>      <pubDate>Thu, 26 Jun 2014 18:46:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9249400/Google_s_move_into_home_automation_means_even_less_privacy?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-06-26T18:46:00Z</dc:date>    </item>    <item>      <title>Supreme Court cellphone ruling a big win for digital privacy</title>      <link>http://www.computerworld.com/s/article/9249375/Supreme_Court_cellphone_ruling_a_big_win_for_digital_privacy?source=rss_cwstaff_jaikumar_vijayan</link>      <description>Privacy and civil rights groups lauded Wednesday's unanimous U.S. Supreme Court ruling that police must obtain a search warrant before searching through the contents of an arrested person's cellphone.</description>      <pubDate>Wed, 25 Jun 2014 19:08:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9249375/Supreme_Court_cellphone_ruling_a_big_win_for_digital_privacy?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-06-25T19:08:00Z</dc:date>    </item>    <item>      <title>Security skills shortage is real, and it's not going away anytime soon</title>      <link>http://www.computerworld.com/s/article/9249272/Security_skills_shortage_is_real_and_it_s_not_going_away_anytime_soon?source=rss_cwstaff_jaikumar_vijayan</link>      <description>The current shortage of cybersecurity professionals in the U.S will likely resolve itself over the next several years, according to the RAND Corp. But until then, companies will find it disturbingly difficult to recruit skilled workers.</description>      <pubDate>Fri, 20 Jun 2014 20:07:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9249272/Security_skills_shortage_is_real_and_it_s_not_going_away_anytime_soon?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-06-20T20:07:00Z</dc:date>    </item>    <item>      <title>Congressman questions FTC breach probe amid claims of 'corporate blackmail'</title>      <link>http://www.computerworld.com/s/article/9249236/Congressman_questions_FTC_breach_probe_amid_claims_of_corporate_blackmail_?source=rss_cwstaff_jaikumar_vijayan</link>      <description>A U.S. House committee has called on the Federal Trade Commission's Inspector General to probe the agency's relationship with a peer-to-peer network-monitoring firm whose data is key evidence in an FTC complaint filed against LabMD.</description>      <pubDate>Thu, 19 Jun 2014 18:48:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9249236/Congressman_questions_FTC_breach_probe_amid_claims_of_corporate_blackmail_?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-06-19T18:48:00Z</dc:date>    </item>    <item>      <title>Bill to require warrant for email searches gains ground in House</title>      <link>http://www.computerworld.com/s/article/9249216/Bill_to_require_warrant_for_email_searches_gains_ground_in_House?source=rss_cwstaff_jaikumar_vijayan</link>      <description>A far-reaching bill that would require the government to obtain a warrant to search through people's emails and other online communications now has majority support in the House of Representatives.</description>      <pubDate>Thu, 19 Jun 2014 10:10:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9249216/Bill_to_require_warrant_for_email_searches_gains_ground_in_House?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-06-19T10:10:00Z</dc:date>    </item>    <item>      <title>Bank not liable for customer's $440,000 cybertheft</title>      <link>http://www.computerworld.com/s/article/9249207/Bank_not_liable_for_customer_s_440_000_cybertheft?source=rss_cwstaff_jaikumar_vijayan</link>      <description>A Missouri escrow firm that lost $440,000 in a 2010 cyberheist cannot hold its bank responsible for the loss an appeals court said this week affirming a lower court's previous ruling on the issue.</description>      <pubDate>Wed, 18 Jun 2014 19:34:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9249207/Bank_not_liable_for_customer_s_440_000_cybertheft?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-06-18T19:34:00Z</dc:date>    </item>    <item>      <title>Internet in Iraq suffers government-ordered shutdowns amid violence</title>      <link>http://www.computerworld.com/s/article/9249107/Internet_in_Iraq_suffers_government_ordered_shutdowns_amid_violence?source=rss_cwstaff_jaikumar_vijayan</link>      <description>In what's become a familiar pattern in recent years, the government in Iraq appears to have ordered major Internet shutdowns over the past few days amid escalating sectarian violence in the country.</description>      <pubDate>Fri, 13 Jun 2014 19:58:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9249107/Internet_in_Iraq_suffers_government_ordered_shutdowns_amid_violence?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-06-13T19:58:00Z</dc:date>    </item>    <item>      <title>P.F. Chang's post-breach move to manual processing is telling</title>      <link>http://www.computerworld.com/s/article/9249105/P.F._Chang_s_post_breach_move_to_manual_processing_is_telling?source=rss_cwstaff_jaikumar_vijayan</link>      <description>The decision by P.F. Chang's China Bistro to switch to manual payment processing after a recent data breach at the restaurant chain is unusual, security experts said this week.</description>      <pubDate>Fri, 13 Jun 2014 19:33:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9249105/P.F._Chang_s_post_breach_move_to_manual_processing_is_telling?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-06-13T19:33:00Z</dc:date>    </item>    <item>      <title>Target finally gets its first CISO</title>      <link>http://www.computerworld.com/s/article/9249037/Target_finally_gets_its_first_CISO?source=rss_cwstaff_jaikumar_vijayan</link>      <description>Target has hired a chief information security officer, a move that's noteworthy mainly because it is the first time the company has had anyone in this role -- even though it is one of the largest retailers in the U.S.</description>      <pubDate>Wed, 11 Jun 2014 19:56:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9249037/Target_finally_gets_its_first_CISO?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-06-11T19:56:00Z</dc:date>    </item>    <item>      <title>Most U.S. credit cards will have microchips by end of 2015</title>      <link>http://www.computerworld.com/s/article/9248998/Most_U.S._credit_cards_will_have_microchips_by_end_of_2015?source=rss_cwstaff_jaikumar_vijayan</link>      <description>The long expected migration of the U.S. payment system to the Europay MasterCard Visa smartcard standard finally appears to be gathering steam.</description>      <pubDate>Tue, 10 Jun 2014 19:52:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9248998/Most_U.S._credit_cards_will_have_microchips_by_end_of_2015?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-06-10T19:52:00Z</dc:date>    </item>    <item>      <title>One year later: Four reasons Edward Snowden remains a polarizing figure</title>      <link>http://www.computerworld.com/s/article/9248858/One_year_later_Four_reasons_Edward_Snowden_remains_a_polarizing_figure_?source=rss_cwstaff_jaikumar_vijayan</link>      <description>Edward Snowden remains a polarizing figure in the U.S. on the one-year anniversary of the first published story based on his leaks about the NSA's  surveillance practices.</description>      <pubDate>Thu, 05 Jun 2014 10:46:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9248858/One_year_later_Four_reasons_Edward_Snowden_remains_a_polarizing_figure_?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-06-05T10:46:00Z</dc:date>    </item>    <item>      <title>The 10 biggest Edward Snowden leaks</title>      <link>http://www.computerworld.com/slideshow/detail/155290/The-10-biggest-Edward-Snowden-leaks</link>      <description>&lt;p&gt; &lt;a href="http://www.computerworld.com/slideshow/detail/155290/The-10-biggest-Edward-Snowden-leaks"&gt;&lt;img src="http://d1piko3ylsjhpd.cloudfront.net/uploads/roboto/slide/image/106464/slide_thumbnail_snowdenPrism.jpg" /&gt;&lt;/a&gt;&lt;/p&gt;One year ago, on June 5, 2013, The Washington Post published the first of Edward Snowden's leaks. Since then, many more revelations have come to light. Here are a look at 10 of the biggest.</description>      <pubDate>Thu, 05 Jun 2014 10:30:00 GMT</pubDate>      <guid isPermaLink="false">http://www.computerworld.com/slideshow/detail/155290/The-10-biggest-Edward-Snowden-leaks</guid>      <dc:date>2014-06-05T10:30:00Z</dc:date>    </item>    <item>      <title>The Snowden leaks: A timeline</title>      <link>http://www.computerworld.com/s/article/9248800/The_Snowden_leaks_A_timeline?source=rss_cwstaff_jaikumar_vijayan</link>      <description>A look back at the security fallout following the NSA spying disclosures that began a year ago after Edward Snowden fled the U.S.</description>      <pubDate>Thu, 05 Jun 2014 10:25:00 GMT</pubDate>      <author>sharon_machlis@computerworld.com (Sharon Machlis)</author>      <guid>http://www.computerworld.com/s/article/9248800/The_Snowden_leaks_A_timeline?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-06-05T10:25:00Z</dc:date>    </item>    <item>      <title>California kills bill requiring that retailers use EMV smartcards</title>      <link>http://www.computerworld.com/s/article/9248810/California_kills_bill_requiring_that_retailers_use_EMV_smartcards?source=rss_cwstaff_jaikumar_vijayan</link>      <description>The California State Senate has killed a bill that would have required California retailers to implement the Europay MasterCard Visa smartcard (EMV) standard that's seen as far safer than magnetic stripe technology used today.</description>      <pubDate>Tue, 03 Jun 2014 19:46:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9248810/California_kills_bill_requiring_that_retailers_use_EMV_smartcards?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-06-03T19:46:00Z</dc:date>    </item>    <item>      <title>Companies should already know how to protect data, FTC argues</title>      <link>http://www.computerworld.com/s/article/9248718/Companies_should_already_know_how_to_protect_data_FTC_argues?source=rss_cwstaff_jaikumar_vijayan</link>      <description>The FTC has published enough information publicly for companies to know what it considers  reasonable security practices for protecting sensitive data, an FTC official said.</description>      <pubDate>Fri, 30 May 2014 20:05:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9248718/Companies_should_already_know_how_to_protect_data_FTC_argues?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-05-30T20:05:00Z</dc:date>    </item>    <item>      <title>In baffling move, TrueCrypt open-source crypto project shuts down</title>      <link>http://www.computerworld.com/s/article/9248658/In_baffling_move_TrueCrypt_open_source_crypto_project_shuts_down?source=rss_cwstaff_jaikumar_vijayan</link>      <description>In a bizarre move, the anonymous managers of the TrueCrypt open-source encryption project abruptly pulled the plug on the effort without explanation.</description>      <pubDate>Thu, 29 May 2014 18:07:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9248658/In_baffling_move_TrueCrypt_open_source_crypto_project_shuts_down?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-05-29T18:07:00Z</dc:date>    </item>    <item>      <title>Advisory firm urges ouster of majority of Target board members over breach</title>      <link>http://www.computerworld.com/s/article/9248631/Advisory_firm_urges_ouster_of_majority_of_Target_board_members_over_breach_?source=rss_cwstaff_jaikumar_vijayan</link>      <description>A company that advises institutional shareholders on governance risk and proxy voting issues wants seven of Target's 10 board directors voted out over the massive data breach disclosed by the retailer last December.</description>      <pubDate>Wed, 28 May 2014 19:59:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9248631/Advisory_firm_urges_ouster_of_majority_of_Target_board_members_over_breach_?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-05-28T19:59:00Z</dc:date>    </item>    <item>      <title>DARPA unveils hack-proof drone tech</title>      <link>http://www.computerworld.com/s/article/9248604/DARPA_unveils_hack_proof_drone_tech?source=rss_cwstaff_jaikumar_vijayan</link>      <description>In a claim reminiscent of Oracle Corp.'s 'unbreakable' marketing campaign of several years ago, the U.S. military has built what it calls a hack proof drone.</description>      <pubDate>Tue, 27 May 2014 19:49:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9248604/DARPA_unveils_hack_proof_drone_tech?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-05-27T19:49:00Z</dc:date>    </item>    <item>      <title>Coming soon to a fridge near you -- targeted ads</title>      <link>http://www.computerworld.com/s/article/9248526/Coming_soon_to_a_fridge_near_you_targeted_ads?source=rss_cwstaff_jaikumar_vijayan</link>      <description>Targeted advertisements are headed to smart fridges, smart thermostats and other Internet-connected devices, raising potentially new privacy issues for consumers who use those products.</description>      <pubDate>Fri, 23 May 2014 10:15:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9248526/Coming_soon_to_a_fridge_near_you_targeted_ads?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-05-23T10:15:00Z</dc:date>    </item>    <item>      <title>AT&amp;T hacker wants government to pay him $13M</title>      <link>http://www.computerworld.com/s/article/9248471/AT_T_hacker_wants_government_to_pay_him_13M?source=rss_cwstaff_jaikumar_vijayan</link>      <description>Andrew 'weev' Auernheimer, whose struggles with U.S. prosecutors have fueled calls for reforming the Computer Fraud and Abuse Act, wants the government to pay him $13 million for imprisoning him for the past three years.</description>      <pubDate>Tue, 20 May 2014 22:04:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9248471/AT_T_hacker_wants_government_to_pay_him_13M?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-05-20T22:04:00Z</dc:date>    </item>    <item>      <title>Hacker indictments against China's military unlikely to change anything</title>      <link>http://www.computerworld.com/s/article/9248435/Hacker_indictments_against_China_s_military_unlikely_to_change_anything?source=rss_cwstaff_jaikumar_vijayan</link>      <description>The U.S. government's decision to formally indict five members of the Chinese military on criminal hacking charges marks a significant escalation of what's been a war of words between both countries.</description>      <pubDate>Mon, 19 May 2014 18:48:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9248435/Hacker_indictments_against_China_s_military_unlikely_to_change_anything?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-05-19T18:48:00Z</dc:date>    </item>    <item>      <title>Snowden leaks prompt tech firms to tout privacy, transparency policies</title>      <link>http://www.computerworld.com/s/article/9248410/Snowden_leaks_prompt_tech_firms_to_tout_privacy_transparency_policies?source=rss_cwstaff_jaikumar_vijayan</link>      <description>Several tech companies have revamped privacy and transparency policies since revelations in leaked National Security Agency (NSA) documents showed that the U.S. was secretly collecting customer data from Internet Service Providers, telecommunications companies and others.</description>      <pubDate>Fri, 16 May 2014 20:12:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9248410/Snowden_leaks_prompt_tech_firms_to_tout_privacy_transparency_policies?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-05-16T20:12:00Z</dc:date>    </item>    <item>      <title>License reader lawsuit can be heard, appeals court rules</title>      <link>http://www.computerworld.com/s/article/9248346/License_reader_lawsuit_can_be_heard_appeals_court_rules?source=rss_cwstaff_jaikumar_vijayan</link>      <description>A federal appeals court this week ruled that a woman's Fourth Amendment rights may have been violated when San Francisco police arrested her after an automated license plate reader mistakenly identified her car as stolen.</description>      <pubDate>Wed, 14 May 2014 20:05:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9248346/License_reader_lawsuit_can_be_heard_appeals_court_rules?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-05-14T20:05:00Z</dc:date>    </item>    <item>      <title>Senator seeks answers on Samsung's fingerprint scanner for Galaxy S5</title>      <link>http://www.computerworld.com/s/article/9248316/Senator_seeks_answers_on_Samsung_s_fingerprint_scanner_for_Galaxy_S5?source=rss_cwstaff_jaikumar_vijayan</link>      <description>U.S. Sen. Al Franken questioned Samsung on the privacy protections the company has in place for the fingerprint scanning technology on its recently released Galaxy S5 smartphone.</description>      <pubDate>Tue, 13 May 2014 20:15:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9248316/Senator_seeks_answers_on_Samsung_s_fingerprint_scanner_for_Galaxy_S5?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-05-13T20:15:00Z</dc:date>    </item>    <item>      <title>With the Internet of Things, smart buildings pose big risk</title>      <link>http://www.computerworld.com/s/article/9248292/_With_the_Internet_of_Things_smart_buildings_pose_big_risk?source=rss_cwstaff_jaikumar_vijayan</link>      <description>In an Internet of Things world, smart buildings with Web-enabled technologies for managing heat, lighting, ventilation, elevators and other systems pose a more immediate security risk for enterprises than consumer technologies.</description>      <pubDate>Tue, 13 May 2014 10:30:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9248292/_With_the_Internet_of_Things_smart_buildings_pose_big_risk?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-05-13T10:30:00Z</dc:date>    </item>    <item>      <title>IT malpractice: Doc operates on server, costs hospitals $4.8M</title>      <link>http://www.computerworld.com/s/article/9248205/IT_malpractice_Doc_operates_on_server_costs_hospitals_4.8M?source=rss_cwstaff_jaikumar_vijayan</link>      <description>An inadvertent data leak that stemmed from a physician's attempt to reconfigure a server cost New York Presbyterian Hospital and Columbia University Medical Center $4.8 million to settle with the U.S. Department of Health and Human Services.</description>      <pubDate>Thu, 08 May 2014 19:58:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9248205/IT_malpractice_Doc_operates_on_server_costs_hospitals_4.8M?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-05-08T19:58:00Z</dc:date>    </item>    <item>      <title>Emails shed light on Google's work with NSA</title>      <link>http://www.computerworld.com/s/article/9248153/Emails_shed_light_on_Google_s_work_with_NSA?source=rss_cwstaff_jaikumar_vijayan</link>      <description>Two sets of emails obtained by Al Jazeera America under a Freedom of Information Act request suggest that Google's cooperation with the National Security Agency may have been less coerced than the company has let on.</description>      <pubDate>Tue, 06 May 2014 20:15:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9248153/Emails_shed_light_on_Google_s_work_with_NSA?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-05-06T20:15:00Z</dc:date>    </item>    <item>      <title>Canada woes, breach seen as cause for Target CEO's exit</title>      <link>http://www.computerworld.com/s/article/9248129/Canada_woes_breach_seen_as_cause_for_Target_CEO_s_exit?source=rss_cwstaff_jaikumar_vijayan</link>      <description>Target CEO Gregg Steinhafel's resignation Monday as president, CEO and chairman of the Board of the company likely isn't a sign that boards of directors are now holding chief executives accountable for massive data breaches.</description>      <pubDate>Mon, 05 May 2014 20:13:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9248129/Canada_woes_breach_seen_as_cause_for_Target_CEO_s_exit?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-05-05T20:13:00Z</dc:date>    </item>    <item>      <title>FTC told to disclose the data security standards it uses for breach enforcement</title>      <link>http://www.computerworld.com/s/article/9248085/FTC_told_to_disclose_the_data_security_standards_it_uses_for_breach_enforcement?source=rss_cwstaff_jaikumar_vijayan</link>      <description>The FTC can be compelled to disclose details of the data security standards it uses to pursue enforcement action against companies that suffer data breaches.</description>      <pubDate>Fri, 02 May 2014 20:19:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9248085/FTC_told_to_disclose_the_data_security_standards_it_uses_for_breach_enforcement?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-05-02T20:19:00Z</dc:date>    </item>    <item>      <title>The Internet of Things likely to drive an upheaval for security</title>      <link>http://www.computerworld.com/s/article/9248069/The_Internet_of_Things_likely_to_drive_an_upheaval_for_security?source=rss_cwstaff_jaikumar_vijayan</link>      <description>The Internet of Things is likely to bring 'a major inflection point in security' sooner than you think.</description>      <pubDate>Fri, 02 May 2014 10:07:00 GMT</pubDate>      <author>jvijayan@computerworld.com (Jaikumar Vijayan)</author>      <guid>http://www.computerworld.com/s/article/9248069/The_Internet_of_Things_likely_to_drive_an_upheaval_for_security?source=rss_cwstaff_jaikumar_vijayan</guid>      <dc:date>2014-05-02T10:07:00Z</dc:date>    </item>    <item>      <title>7 hidden dangers of wearable computers</title>      <link>http://www.computerworld.com/slideshow/detail/141686/7-hidden-dangers-of-wearable-computers</link>      <description>&lt;p&gt; &lt;a href="http://www.computerworld.com/slideshow/detail/141686/7-hidden-dangers-of-wearable-computers"&gt;&lt;img src="http://d1piko3ylsjhpd.cloudfront.net/uploads/roboto/slide/image/90845/slide_thumbnail_CW_7wearable_v2.jpg" /&gt;&lt;/a&gt;&lt;/p&gt;Wearable computers like smart clothes and smart watches offer a myriad of benefits, but also raise security concerns. Here are 7 worries associated with wearable devices.</description>      <pubDate>Tue, 25 Feb 2014 11:00:00 GMT</pubDate>      <guid isPermaLink="false">http://www.computerworld.com/slideshow/detail/141686/7-hidden-dangers-of-wearable-computers</guid>      <dc:date>2014-02-25T11:00:00Z</dc:date>    </item>  </channel></rss>
